GPO abuse
Last updated
Last updated
There is a GPO abuse on the north domain
To abuse GPO we will use the project created by Hackndo : pyGPOAbuse
The github readme file say : “It will create an immediate scheduled task as SYSTEM on the remote computer for computer GPO, or as logged in user for user GPO.”
We get the id from bloodhound and launch the exploit with :
Now let’s try to get a powershell reverseshell
Catch the Shell - this needs to be done from the Lab Parrot OS VM.
And a few moments later we get the powershell reverseshell